[go: up one dir, main page]

CN111179098B - Service transfer-out report processing method, system, equipment and medium - Google Patents

Service transfer-out report processing method, system, equipment and medium Download PDF

Info

Publication number
CN111179098B
CN111179098B CN201911194048.XA CN201911194048A CN111179098B CN 111179098 B CN111179098 B CN 111179098B CN 201911194048 A CN201911194048 A CN 201911194048A CN 111179098 B CN111179098 B CN 111179098B
Authority
CN
China
Prior art keywords
report
service
request
transfer
service transfer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911194048.XA
Other languages
Chinese (zh)
Other versions
CN111179098A (en
Inventor
焦晓玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Taikang Pension Insurance Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Taikang Pension Insurance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd, Taikang Pension Insurance Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201911194048.XA priority Critical patent/CN111179098B/en
Publication of CN111179098A publication Critical patent/CN111179098A/en
Application granted granted Critical
Publication of CN111179098B publication Critical patent/CN111179098B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a method, a system, equipment and a medium for processing a service transfer-out report, wherein the method comprises the following steps: receiving a service transfer-out request aiming at a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service transfer-out request comprises an identifier of a second trusted mechanism; according to the service transfer-out request, performing service transfer-out operation; the target trusted mechanism of the service roll-out operation is the second trusted mechanism; judging whether a report request mark exists in configuration information corresponding to the second trusted mechanism; and if the report request mark exists in the configuration information corresponding to the second trusted authority, generating a service transfer-out report corresponding to the service transfer-out operation. According to the embodiment of the application, the optimization processing of the service transfer-out report is realized, the generation of the service transfer-out report is separated from the transfer-out service, the service transfer-out report is generated only when the report is required by the trusted authority, the generation of the report on all transfer-out services is avoided, and the consumption of resources is reduced.

Description

Service transfer-out report processing method, system, equipment and medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method, a system, an apparatus, and a medium for processing a service forwarding report.
Background
The enterprise annuity is a supplementary pension system, the employee can participate in the annuity plan of the enterprise to hold the enterprise annuity, the business operation of the enterprise annuity is managed by the enterprise entrusted trusted authority, when the employee leaves the office, the current trusted authority processes the business of the enterprise annuity for the employee, and then the trusted authority entrusted by the new enterprise processes the business of the enterprise annuity for the employee.
In the business annuity transfer-out process, a part of entrusted institutions entrusted by new enterprises need to transfer out business annuity transfer-out reports of users to transact business of business annuities for the users. In the prior art, the trusted authority usually sends out the report by manually sending out the enterprise annuity by staff, and the trusted authority relies on a large amount of manual work and off-line processing, which is time-consuming and labor-consuming.
Disclosure of Invention
In view of the foregoing, a method, system, device, and medium for processing a service roll-out report are provided, where the method, device, and medium overcome or at least partially solve the foregoing problems, and include:
a method of processing a service roll-out report, the method comprising:
Receiving a service transfer-out request aiming at a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
carrying out service transfer-out operation according to the service transfer-out request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
judging whether a report request mark exists in configuration information corresponding to the second trusted mechanism;
and if the configuration information corresponding to the second trusted authority contains a report request mark, generating a service transfer-out report corresponding to the service transfer-out operation.
Optionally, before the step of determining whether the report request flag exists in the configuration information corresponding to the second trusted authority, the method further includes:
judging whether the current time is a preset time or not;
and if the current time is the preset time, executing the step of judging whether the report request mark exists in the configuration information corresponding to the second trusted mechanism.
Optionally, before the step of determining whether the report request flag exists in the configuration information corresponding to the second trusted authority, the method further includes:
Determining a service transfer-out operation identifier corresponding to the service transfer-out operation;
judging whether the service roll-out operation identifier is in a preset list or not; the preset list comprises service transfer-out operation identifiers corresponding to the service transfer-out operations for which the service transfer-out report is generated;
and if the service transfer-out operation identifier is not in the preset list, executing the judgment of whether a report request mark exists in the configuration information corresponding to the second trusted mechanism.
Optionally, before the step of determining whether the report request flag exists in the configuration information corresponding to the second trusted authority, the method further includes:
receiving a report query request;
and if the report inquiry request is a request for the business transfer-out operation, executing the step of judging whether a report request mark exists in the configuration information corresponding to the second trusted authority.
Optionally, after the step of generating the service roll-out report corresponding to the service roll-out operation, the method further includes:
and adding the service transfer-out operation identifier corresponding to the service transfer-out operation into a preset list.
Optionally, after the step of generating the service roll-out report corresponding to the service roll-out operation, the method further includes:
Receiving a report view request for the business turn-out operation;
and determining a service transfer-out report corresponding to the service transfer-out operation for display.
Optionally, the service roll-out request is a service roll-out request for an enterprise annuity.
A system for processing a service roll-out report, comprising:
the receiving request module is used for receiving a service forwarding request aiming at a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
the service transfer-out module is used for carrying out service transfer-out operation according to the service transfer-out request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
the judging and marking module is used for judging whether a report request mark exists in the configuration information corresponding to the second trusted mechanism;
and the report generation module is used for generating a service transfer-out report corresponding to the service transfer-out operation if the report request mark exists in the configuration information corresponding to the second trusted mechanism.
Optionally, the apparatus further comprises:
the current time judging module is used for judging whether the current time is preset time or not;
And determining a current time module, wherein the current time module is used for calling the judgment marking module if the current time is the preset time.
Optionally, the apparatus further comprises:
the determining operation identification module is used for determining a service transfer-out operation identification corresponding to the service transfer-out operation;
the judging operation identification module is used for judging whether the service transferring operation identification is in a preset list or not; the preset list comprises service transfer-out operation identifiers corresponding to the service transfer-out operations for which the service transfer-out report is generated;
and the confirming operation identification module is used for calling the judging marking module if the service transfer operation identification is not in the preset list.
Optionally, the apparatus further comprises:
the receiving query request module is used for receiving a report query request;
and the query request determining module is used for calling the judgment marking module if the report query request is a request for the business transfer-out operation.
Optionally, the apparatus further comprises:
and the adding operation identification module is used for adding the service transfer-out operation identification corresponding to the service transfer-out operation into a preset list.
Optionally, the apparatus further comprises:
a receiving and viewing request module, configured to receive a report viewing request for the service roll-out operation;
And the report display module is used for determining the business transfer-out report corresponding to the business transfer-out operation so as to display the business transfer-out report.
Optionally, the service roll-out request is a service roll-out request for an enterprise annuity.
An electronic device comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor implements the steps of the method of processing a traffic roll-out report as described above.
A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the steps of a method of processing a traffic roll-out report as described above.
The embodiment of the application has the following advantages:
in the embodiment of the application, the service transfer-out request for the target user is received, the service transfer-out operation is carried out according to the service transfer-out request, the current first trusted mechanism transfers to the target second trusted mechanism, whether report request marks exist in configuration information corresponding to the second trusted mechanism is judged, if the report request marks exist in the configuration information corresponding to the second trusted mechanism, the service transfer-out report corresponding to the service transfer-out operation is generated, the optimization processing of the service transfer-out report is realized, the dependence on manual operation is avoided, the service transfer-out report is generated by separating the generation of the service transfer-out report from the transfer-out service, the generation of the report is only carried out when the trusted mechanism requests the report, the generation of the report for all transfer-out services is avoided, and the consumption of resources is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings that are needed in the description of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of steps of a method for service roll-out reporting according to one embodiment of the present application;
FIG. 2 is a schematic diagram of a system architecture according to an embodiment of the present application;
FIG. 3 is a flow chart of steps of another method for service roll-out reporting provided by an embodiment of the present application;
FIG. 4 is a flow chart of steps of another method for service roll-out reporting provided by an embodiment of the present application;
fig. 5 is a block diagram of an embodiment of a service roll-out report processing system according to an embodiment of the present application.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will become more readily apparent, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. It will be apparent that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
Referring to fig. 1, a step flow chart of a method for processing a service roll-out report according to an embodiment of the present application may specifically include the following steps:
step 101, receiving a service forwarding request for a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
the service roll-out request may include a service roll-out request for an enterprise annuity, the target user may include a user to-be-managed enterprise annuity roll-out service, and the service roll-out request may include information of a current trusted authority (first trusted authority) of the target user, such as an identification of the first trusted authority, a billing management line name of the first trusted authority, and the like, and information of a roll-out destination trusted authority (second trusted authority), such as an identification of the second trusted authority, a billing management line name of the second trusted authority, and the like.
When the user needs to transact the business of the business annuity, and change the trusted authority of the business annuity, the user can initiate the business annuity transfer-out application aiming at the target user, and then the trusted system of the current trusted authority of the target user can receive the business transfer-out request aiming at the business annuity of the target user, and then the first trusted authority information and the identification of the second trusted authority of the target user can be obtained from the business transfer-out request.
In practical application, in order to meet the demands of users (such as individual users and enterprise users) at different levels for self-applying to transact business of annual gold transfer, a visual customer service platform system can be provided, for example, a WeChat applet or APP provided by a trusted authority, and the customer service platform can be operated on a device with a display function, such as a PC, a portable computer, a mobile terminal (such as a mobile phone and a tablet computer) and the like; the customer service platform can be accessed through the Internet, and can be used as an independent external platform to be in butt joint with a trusted system through an information interface, so that information calling is performed. While trusted systems are not directly accessible via the internet, but only by the staff of the trusted authority via the intranet of the trusted system.
Specifically, the mobile terminal may be used as an operation carrier of the customer service platform, as shown in fig. 2, the individual user and the enterprise user may access the customer service platform through the internet, and apply for handling the business of transferring the annual gold of the enterprise to one or more target users by themselves, where the above two acceptance channels may be referred to as on-personal-network acceptance and on-enterprise acceptance. The enterprise user may also request the institution user (i.e., the staff of the trusted institution) to apply for the business of the business annuity transfer to one or more target users through the trusted system instead of the enterprise, by means of mail, telephone, etc., and the acceptance channel may be referred to as an institution acceptance. The customer service platform system and the trusted system can be in communication connection through an information interface.
For example, the individual user Mr. may log directly into the customer service platform, initiate an application to transfer the Mr. account from the annual gold of the enterprise A, transfer to the destination trusted authority as the trusted authority B, and generate a service transfer request for the Mr. according to the transfer application. The trusted system may automatically assign the service application number 001 corresponding to the outgoing service application.
For another example, the enterprise user N enterprise may directly log into the customer service platform to initiate an application for transferring out personal accounts such as N enterprise prune women, mr. King, mr. Zhao, etc. from N enterprise annuals, and the application is transferred to a destination trusted mechanism which is a C trusted mechanism (prune women), a B trusted mechanism (mr. King), and a D trusted mechanism (mr. Zhao), respectively, and according to the transfer-out application, a service transfer-out request for N enterprise prune women, mr. King, mr. Zhao can be generated. The trusted system may automatically allocate the service application number 002 corresponding to the outgoing service application.
For another example, the agency user a trusted authority may initiate an application for transferring personal accounts such as mr. P corporation's offspring and peri-peri women from annual gold of the P corporation through the trusted system, and the transferred-in target trusted authorities are respectively a trusted authority B (mr. Grand) and a trusted authority C (peri-peri women), and a service transfer-out request for mr. P corporation's offspring and peri-peri women may be generated according to the transfer-out service application. The trusted system may automatically allocate the service application number 003 corresponding to the roll-out service application.
102, performing service transfer-out operation according to the service transfer-out request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
after receiving the service transfer-out request for the target user, the trusted authority can perform service transfer-out operation for the target user according to the service transfer-out request, transfer the target user out of the current enterprise annuity plan, and generate a corresponding service transfer-out operation identifier for the service transfer-out operation of the target user.
For example, mr. Tense is hired in the a enterprise, takes part in the annual book plan of the a enterprise, "annual book plan of the a enterprise", the trusted authority is a, and when mr. Tense leaves the a enterprise to enter the B enterprise, it is necessary to take part in the annual book plan of the B enterprise, "annual book plan of the B enterprise", and the trusted authority is B. After mr. Tense applies for the business of transferring out of the enterprise annuity, the supporting mechanism A performs business of transferring out of the enterprise annuity for mr. Tense, and the supporting mechanism B can ask mr. Tense for a report issued by the supporting mechanism A to prove that mr. Tense has transferred out of the annual gold plan of company A and then transfer into the service of annual gold plan of company B for mr. Tense.
For another example, a prune woman is hired in an N enterprise, takes part in an annual gold plan of the N enterprise, the trusted authority of which is a, and when the prune woman leaves the N enterprise and enters the M enterprise, takes part in an annual gold plan of the M enterprise, the trusted authority of which is C. After the plum women apply for the business of transferring out the business of the business annuity, the A trusted authority performs the business of transferring out the business of the business annuity for the plum women, and then the C trusted authority can transfer into the service of the 'M company annuity plan' for the plum women without asking the report of the A trusted authority for the plum women.
As another example, zheng Mr. hire from the X enterprise, participated in the annual gold plan of the X enterprise, "annual gold plan of the X enterprise", the trusted authority of which is A, and when Zheng Mr. leave from the X enterprise to enter the Y enterprise, the Zheng Mr. hire should participated in the annual gold plan of the Y enterprise, "annual gold plan of the Y enterprise", the trusted authority of which is A. After Zheng Mr. applies for the business of transferring out of the enterprise annuity, the A trusted authority carries out the business of transferring out of the enterprise annuity aiming at Zheng Mr. and then transfers into the service of 'Y company annuity plan' for Zheng Mr. because the trusted authority is unchanged, the transferring out and transferring in of the enterprise annuity are processed in the same trusted system, and therefore, report is not required.
Step 103, judging whether a report request mark exists in configuration information corresponding to the second trusted mechanism;
the configuration information corresponding to the second trusted authority may include a report request flag, where the report request flag may indicate whether the second trusted authority has a request to report. The configuration information corresponding to the second trusted mechanism may be configured, for example, may be preset, or when the requirement of the second trusted mechanism is changed, the corresponding configuration information may also be updated through the system interface.
After the service transfer-out operation is performed on the target user, the identifier of the second trusted mechanism in the service transfer-out request corresponding to the service transfer-out operation can be identified according to the service transfer-out operation identifier, the identifier of the second trusted mechanism can be adopted to match with the configuration information corresponding to the second trusted mechanism, and further whether the report request mark exists in the configuration information corresponding to the second trusted mechanism is judged.
In practical application, configuration information corresponding to the second trusted mechanism may be preset, for example, the configuration may be performed according to whether the second trusted mechanism needs a service transfer report, if the second trusted mechanism needs the service transfer report, a field for whether the second trusted mechanism needs the service transfer report may be configured as "yes" in the configuration information corresponding to the second trusted mechanism, and if the second trusted mechanism does not need the service transfer report, a field for whether the second trusted mechanism needs the service transfer report may be configured as "no" in the configuration information corresponding to the second trusted mechanism; alternatively, the configuration may be based on the need for periodic (e.g., one month, one quarter, etc.) feedback reporting by the second trusted authority. When the demand information of the second trusted mechanism is changed, the corresponding configuration information of the second trusted mechanism can be updated through the system interface.
And 104, if the report request mark exists in the configuration information corresponding to the second trusted authority, generating a service transfer-out report corresponding to the service transfer-out operation.
Wherein the service roll-out report may include a service roll-out report for the business annuity, and the service roll-out report may include personal information of the target user and business annuity information, such as name, certificate type, certificate number, and information of the current trusted authority (first trusted authority) of the target user, and information of a roll-out destination trusted authority (second trusted authority), business annuity roll-out amount, and the like.
In a specific implementation, whether the configuration information corresponding to the second trusted mechanism has a report request mark can be judged, if the configuration information corresponding to the second trusted mechanism has the report request mark, the second trusted mechanism can be confirmed to need a service transfer-out report, and then the service transfer-out report corresponding to the service transfer-out operation of the target user is generated.
Specifically, according to the configuration information corresponding to the second trusted mechanism, if the field in the configuration information corresponding to the second trusted mechanism, which is to be reported, is configured as yes, a service transfer-out report for the target user can be generated; if the field of the configuration information corresponding to the second trusted authority, which is to be reported, is configured as no, a service transfer report for the target user may not be generated. The generated traffic roll-out report may be stored in the trusted system.
In an embodiment of the present application, after step 104, the method may further include the following steps:
receiving a report view request for the business turn-out operation; and determining a service transfer-out report corresponding to the service transfer-out operation for display.
The report viewing request may be a report viewing request of a service roll-out report for the target user, and the report viewing request may include a service roll-out operation identifier corresponding to the service roll-out operation for the target user.
After the service roll-out report is generated, when a report checking request of the service roll-out report of the service roll-out operation of the target user is received, a service roll-out operation identifier corresponding to the service roll-out operation in the report checking request can be obtained, and then the service roll-out operation identifier can be adopted to determine the service roll-out report corresponding to the service roll-out operation so as to display the service roll-out report to the user.
In practical application, after the trusted system generates the service transfer-out report, the service transfer-out report can be displayed to the user according to requirements of users at different levels for viewing the report. When the user performs report checking operation, if the user is the user initiating the service request for transfer-out, determining a service transfer-out report corresponding to the service request number according to the service request number corresponding to the service request initiated by the user, and displaying the service transfer-out report to the user; or if the user is not the user initiating the service request, determining a service transfer report corresponding to the service transfer operation identifier according to the service transfer operation identifier corresponding to the service transfer operation of the user, and displaying the report to the user.
For example, the individual user mr. Wang can log in the customer service platform and only check the service transfer-out report of himself, and the service transfer-out report corresponding to the service transfer-out operation identifier can be determined according to the service transfer-out operation identifier corresponding to the service transfer-out operation of mr. Wang so as to be checked by mr. Wang.
For another example, the enterprise user N enterprise can log in the customer service platform to check the service transfer-out report of the related personnel under the transfer-out service application initiated by the enterprise, and can determine the service transfer-out report of the personnel needing to generate the report under the service application number 002 according to the service application number 002 corresponding to the transfer-out service application initiated by the N enterprise, so as to be checked by the N enterprise.
For another example, the mechanism user a trusted mechanism may check, through a customer service platform or a trusted system, a service roll-out report of a related person under a roll-out service application initiated by the trusted mechanism a, and may determine, according to the service application number 003 corresponding to the roll-out service application initiated by the trusted mechanism a, a service roll-out report of a person under the service application number 003 that needs to generate a report, so that the trusted mechanism a checks and feeds back the service roll-out report to the enterprise P.
By receiving the report viewing request for the service transfer-out operation, the service transfer-out report corresponding to the service transfer-out operation can be determined to be displayed to the user, the requirements of users at different levels can be met, the personal user only views the personal report, the enterprise user can view the report of the related personnel under the condition that the enterprise user initiates the service, and the institution staff can view the report of the related personnel who initiates the service.
In the embodiment of the application, the service transfer-out request for the target user is received, the service transfer-out operation is carried out according to the service transfer-out request, the current first trusted mechanism transfers to the target second trusted mechanism, whether report request marks exist in configuration information corresponding to the second trusted mechanism is judged, if the report request marks exist in the configuration information corresponding to the second trusted mechanism, the service transfer-out report corresponding to the service transfer-out operation is generated, the optimization processing of the service transfer-out report is realized, the dependence on manual operation is avoided, the service transfer-out report is generated by separating the generation of the service transfer-out report from the transfer-out service, the generation of the report is only carried out when the trusted mechanism requests the report, the generation of the report for all transfer-out services is avoided, and the consumption of resources is reduced.
Referring to fig. 3, a flowchart illustrating a step of another method for processing a service roll-out report according to an embodiment of the present application may specifically include the following steps:
step 301, receiving a service forwarding request for a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
Step 302, performing service transfer-out operation according to the service transfer-out request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
step 303, receiving a report query request;
the report query request may be a report query request of a service roll-out report for the target user, and the report query request may include a service roll-out operation identifier corresponding to the service roll-out operation for the target user.
After the business transfer-out operation is performed, and the time of batch report generation preset by the system is not reached, the user needs to perform report query operation, the user can initiate report query request aiming at the target user, and the trusted system can receive report query request aiming at the business transfer-out report of the target user.
Specifically, before the report is generated in a timed batch mode, an individual user and an enterprise user can log in a customer service platform to carry out report query operation, and an organization user can carry out report query operation through a trusted system.
Step 304, if the report inquiry request is a request for the service transfer-out operation, judging whether a report request mark exists in the configuration information corresponding to the second trusted authority;
After receiving the report query request, the report query request can be confirmed to be a request of the service transfer-out operation aiming at the target user by acquiring the service transfer-out operation identifier in the report query request, further, the identifier of a second trusted mechanism in the service transfer-out request corresponding to the service transfer-out operation can be identified according to the service transfer-out operation identifier, and the identifier of the second trusted mechanism can be adopted to match with the configuration information corresponding to the second trusted mechanism so as to judge whether the report request mark exists in the configuration information corresponding to the second trusted mechanism.
In practical application, when a user performs report query operation, the operation to be generated of a service transfer-out report for the user can be triggered by clicking a 'report downloading' button of a display page under the current operation, and a system background can acquire a service transfer-out operation identifier in a report query request so as to further judge whether a second trusted authority of the user has a requirement for requesting the report.
In an example, when the user performs the report query operation, if the report request flag does not exist in the configuration information corresponding to the second trusted authority of the user, the current operation display page of the user may have no viewing option or no "download report" button, so the report query operation of the user may not trigger the report generation operation.
And step 305, if the configuration information corresponding to the second trusted authority has a report request mark, generating a service transfer-out report corresponding to the service transfer-out operation.
By judging whether the configuration information corresponding to the second trusted mechanism has the report request mark or not, if the configuration information corresponding to the second trusted mechanism has the report request mark, the second trusted mechanism can be confirmed to need the service transfer-out report, and then the service transfer-out report corresponding to the service transfer-out operation of the target user is generated.
In practical application, before the report is generated in a timed batch mode, the user performs report inquiry, the generation operation of the business transfer report for the user is triggered, if the report request mark exists in the configuration information corresponding to the second trusted authority of the user, the business transfer report for the user can be generated, and the user can check at the moment. When the trigger report generation operation is completed, personal information and enterprise annuity information of the user who has generated the report can be recorded, and the user's business turn-out report can be confirmed to be generated. Because report generation triggered by report query operation performed by the user only aims at the querying user, only a business transfer-out report aiming at report query operation can be generated, and performance problems caused when the number of people involved is high can be avoided.
For example, before the report is generated in a batch mode, the mr logs in the customer service platform to perform report inquiry operation for the mr, and the mr can check the business transfer report of the mr at the time. After the report inquiry operation is completed, the system background can automatically record information such as name, certificate type, certificate number, transfer-out amount and the like of Mr. king, and can confirm that the service transfer-out report of Mr. king is generated.
In an example, a report generation operation triggered by a report query operation may add a trigger generation identifier to a generated business roll-out report, e.g., a report generation operation triggered by a query operation by an individual user, an enterprise user, or an organization user, and a personal trigger generation identifier, an enterprise trigger generation identifier, or an organization trigger generation identifier may be added to the generated report, respectively, to enable distinguishing a generation trigger path of report generation triggered by the user query operation.
In an embodiment of the present application, after step 104, the method may further include the following steps:
and adding the service transfer-out operation identifier corresponding to the service transfer-out operation into a preset list.
The preset list may include a service roll-out operation identifier corresponding to the service roll-out operation for which the service roll-out report has been generated.
In a specific implementation, an identifier preset list may be preset to record a service roll-out operation identifier corresponding to a service roll-out operation for which a service roll-out report has been generated. After the user inquires to trigger the generation of the service transfer-out report, the service transfer-out operation identifier corresponding to the service transfer-out operation of the generated service transfer-out report can be added into a preset list, and the generation track of the service transfer-out operation identifier is recorded in the background of the system, so that the generated report can be filtered when the report is generated in a timed batch mode and is not repeatedly generated for the report triggered to be generated before the report is generated in a timed batch mode.
In the embodiment of the application, by receiving the service roll-out request for the target user, performing the service roll-out operation according to the service roll-out request, then receiving the report query request, if the report query request is a request for the service roll-out operation, judging whether report request marks exist in configuration information corresponding to the second trusted mechanism, and if the report request marks exist in the configuration information corresponding to the second trusted mechanism, generating the service roll-out report corresponding to the service roll-out operation, so that the optimization processing of the service roll-out report is realized, the user can trigger report generation through inquiring the report before generating the report in a timed batch mode, and the service roll-out report is generated only when the trusted mechanism requests the report, thereby avoiding generating reports for all the roll-out services and reducing the consumption of resources.
Referring to fig. 4, a flowchart illustrating steps of another method for processing a service roll-out report according to an embodiment of the present application may specifically include the following steps:
step 401, receiving a service forwarding request for a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
step 402, according to the service transfer-out request, performing a service transfer-out operation; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
step 403, judging whether the current time is a preset time;
the preset time may be a time for batch generation of service transfer-out reports. The preset time can be preset, and the preset time can be set to be a non-business handling peak time or a non-business volume time on the trusted system.
After the business transfer-out operation is carried out on the target user, whether the current time is the time for generating the business transfer-out report in batches can be judged, the report batch generation operation is carried out at the non-business handling peak time or the non-business volume time, the performance problem can be avoided, and the performance of the system is improved.
Step 404, if the current time is a preset time, determining a service transfer-out operation identifier corresponding to the service transfer-out operation;
when the current time is judged to be the preset time, the report generating operation aiming at the current batch task can be considered to be started, the current batch application form can be adopted, and according to the service application number in the application form, the service application number can correspond to one or more service transfer-out operations, and further the service transfer-out operation identification corresponding to the service transfer-out operation can be determined.
Specifically, when 2 am, all the service applications of the current day can be collected as the current batch task, and the application form of the current batch task can be generated according to the service application numbers corresponding to all the service applications of the current day, for example, if the service volume of the current day is three, the service application numbers are 001, 002 and 003, the current batch task application form of the three services can be generated, the service application numbers can be associated with the service transfer operation function and the report generation operation function, and then the service transfer operation identification corresponding to the service transfer operation to be reported can be determined according to the service application numbers in the current batch task application form.
Step 405, judging whether the service roll-out operation identifier is in a preset list; the preset list comprises service transfer-out operation identifiers corresponding to the service transfer-out operations for which the service transfer-out report is generated;
after determining the service transfer-out operation identifier corresponding to the service transfer-out operation to be reported, determining whether the service transfer-out operation identifier to be reported is in the preset list or not in the preset list recorded with the service transfer-out operation identifier of the generated service transfer-out report.
Step 406, if the service forwarding operation identifier is not in the preset list, judging whether a report request mark exists in the configuration information corresponding to the second trusted mechanism;
and judging whether the service transfer-out operation identifier of the report to be generated is in a preset list or not, if the service transfer-out operation identifier is not in the preset list, confirming that the report corresponding to the service transfer-out operation identifier is not generated, and further judging whether a report request mark exists in configuration information corresponding to a second trusted mechanism according to the service transfer-out operation of which the report is not generated.
In practical application, when the time of generating reports in batches at fixed time is reached, and the operation of generating reports by transferring the business of the target users under the current batch task is started, the target users who have generated the reports in the current batch task application form can be filtered and removed, and then the filtered application form is adopted to perform batch report generation operation.
And step 407, if the configuration information corresponding to the second trusted authority has a report request mark, generating a service transfer-out report corresponding to the service transfer-out operation.
In a specific implementation, by judging whether a report request mark exists in configuration information corresponding to a second trusted mechanism according to a service transfer operation of a non-report, if the report request mark exists in the configuration information corresponding to the second trusted mechanism, the corresponding service transfer report can be generated according to the service transfer operation of the non-report so as to generate the service transfer report only for target users which do not generate and need to generate the report in the current batch task, thereby effectively avoiding repeated generation of the report generated by query triggering, avoiding generation of the report for the target users which do not need to report, reducing production redundant data and improving the utilization rate of hard disk resources.
As an example, when a preset time arrives to initiate batch generation of a report, a report batch generation operation for a current batch task may be triggered, a trigger generation identifier may be added to the generated report, for example, a report generation operation triggered by a trusted system through a timed batch generation operation may be added to the generated report batch trigger generation identifier to enable distinguishing a generation trigger path that triggers generation of a report through the timed batch generation operation.
In one example of the embodiment of the present application, after the report is periodically generated in batch, when the user performs the report viewing operation, the report is forwarded for the services generated by different generation triggering paths, and the user may perform the report viewing through the report viewing operation. For example, the outgoing business application initiated by the N enterprise includes mr. King and mr. Zhao, and the individual user mr. King is triggered by the query to generate the report for the user, the report of mr. Zhao is generated by the 2 o' clock system in the early morning in a batch mode, and the outgoing business report of mr. King and mr. Zhao can be checked when the N enterprise checks according to the business application number 002.
In the embodiment of the application, the service transfer-out request for the target user is received, the service transfer-out operation is performed according to the service transfer-out request, the service transfer-out operation identifier corresponding to the service transfer-out operation is determined when the current time is judged to be the preset time, whether the service transfer-out operation identifier is in a preset list is judged, if the service transfer-out operation identifier is not in the preset list, whether report request marks exist in configuration information corresponding to the second trusted mechanism is judged, if the report request marks exist in the configuration information corresponding to the second trusted mechanism, the service transfer-out report corresponding to the service transfer-out operation is generated, the optimization processing of the service transfer-out report is realized, and the generation of the batch report is performed at the non-service peak time, and meanwhile, the service transfer-out report is generated only when the trusted mechanism requests the report, so that the report is generated for all the transfer-out services is avoided, and the consumption of resources is reduced.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments and that the acts referred to are not necessarily required by the embodiments of the present application.
Referring to fig. 5, a block diagram of an embodiment of a processing system for service roll-out report according to an embodiment of the present application is shown, which may specifically include the following modules:
a receiving request module 501, configured to receive a service forwarding request for a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
a service forwarding module 502, configured to perform service forwarding operation according to the service forwarding request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
a judging and marking module 503, configured to judge whether a report request mark exists in the configuration information corresponding to the second trusted mechanism;
And the report generating module 504 is configured to generate a service transfer-out report corresponding to the service transfer-out operation if a report request flag exists in the configuration information corresponding to the second trusted authority.
In an embodiment of the present application, the apparatus further includes:
the current time judging module is used for judging whether the current time is preset time or not;
and determining a current time module, wherein the current time module is used for calling the judgment marking module 503 if the current time is a preset time.
In an embodiment of the present application, the apparatus further includes:
the determining operation identification module is used for determining a service transfer-out operation identification corresponding to the service transfer-out operation;
the judging operation identification module is used for judging whether the service transferring operation identification is in a preset list or not; the preset list comprises service transfer-out operation identifiers corresponding to the service transfer-out operations for which the service transfer-out report is generated;
and a confirmation operation identification module, configured to invoke the judgment marking module 503 if the service roll-out operation identification is not in a preset list.
In an embodiment of the present application, the apparatus further includes:
the receiving query request module is used for receiving a report query request;
and a determining query request module, configured to invoke the judging marking module 503 if the report query request is a request for the service roll-out operation.
In an embodiment of the present application, the apparatus further includes:
and the adding operation identification module is used for adding the service transfer-out operation identification corresponding to the service transfer-out operation into a preset list.
In an embodiment of the present application, the apparatus further includes:
a receiving and viewing request module, configured to receive a report viewing request for the service roll-out operation;
and the report display module is used for determining the business transfer-out report corresponding to the business transfer-out operation so as to display the business transfer-out report.
In an embodiment of the present application, the service transfer-out request is a service transfer-out request for an enterprise annuity.
An embodiment of the present application further provides an electronic device, which may include a processor, a memory, and a computer program stored on the memory and capable of running on the processor, where the computer program implements the steps of the method for processing a service roll-out report as described above when executed by the processor.
An embodiment of the present application further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the method for processing a business turn-out report as above.
For product embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, with reference to the description of the method embodiments in part.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
It will be apparent to those skilled in the art that embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present embodiments have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the present application.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
The foregoing has described in detail the method, system, apparatus and medium for processing a service delivery report, and specific examples have been applied herein to illustrate the principles and embodiments of the present application, and the above examples are only used to help understand the method and core idea of the present application; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (9)

1. A method for processing a service roll-out report, the method comprising:
receiving a service transfer-out request aiming at a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
carrying out service transfer-out operation according to the service transfer-out request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
receiving a report query request;
if the report inquiry request is a request for the business transfer-out operation, judging whether a report request mark exists in configuration information corresponding to the second trusted mechanism;
and if the configuration information corresponding to the second trusted authority contains a report request mark, generating a service transfer-out report corresponding to the service transfer-out operation.
2. The method of claim 1, wherein prior to the step of determining whether a report need flag is present in the configuration information corresponding to the second trusted authority, the method further comprises:
judging whether the current time is a preset time or not;
and if the current time is the preset time, executing the step of judging whether the report request mark exists in the configuration information corresponding to the second trusted mechanism.
3. The method of claim 2, wherein prior to the step of determining whether a report need flag is present in the configuration information corresponding to the second trusted authority, the method further comprises:
determining a service transfer-out operation identifier corresponding to the service transfer-out operation;
judging whether the service roll-out operation identifier is in a preset list or not; the preset list comprises service transfer-out operation identifiers corresponding to the service transfer-out operations for which the service transfer-out report is generated;
and if the service transfer-out operation identifier is not in the preset list, executing the judgment of whether a report request mark exists in the configuration information corresponding to the second trusted mechanism.
4. The method of claim 1, wherein after the step of generating a traffic roll-out report corresponding to the traffic roll-out operation, the method further comprises:
and adding the service transfer-out operation identifier corresponding to the service transfer-out operation into a preset list.
5. The method according to claim 1 or 2 or 3 or 4, wherein after the step of generating a traffic roll-out report corresponding to the traffic roll-out operation, the method further comprises:
receiving a report view request for the business turn-out operation;
And determining a service transfer-out report corresponding to the service transfer-out operation for display.
6. The method of claim 1, wherein the service roll-out request is a service roll-out request for an enterprise annuity.
7. A system for processing a service roll-out report, comprising:
the receiving request module is used for receiving a service forwarding request aiming at a target user; the current trusted mechanism of the target user is a first trusted mechanism, and the service forwarding request comprises an identifier of a second trusted mechanism;
the service transfer-out module is used for carrying out service transfer-out operation according to the service transfer-out request; the target trusted mechanism of the business transfer-out operation is the second trusted mechanism;
the receiving query request module is used for receiving a report query request;
the judging and marking module is used for judging whether a report request mark exists in the configuration information corresponding to the second trusted mechanism if the report query request is a request for the business transfer-out operation;
and the report generation module is used for generating a service transfer-out report corresponding to the service transfer-out operation if the report request mark exists in the configuration information corresponding to the second trusted mechanism.
8. An electronic device comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor carries out the steps of the method of processing a traffic roll-off report according to any one of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the steps of the method of processing a traffic roll-out report according to any of claims 1 to 6.
CN201911194048.XA 2019-11-28 2019-11-28 Service transfer-out report processing method, system, equipment and medium Active CN111179098B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911194048.XA CN111179098B (en) 2019-11-28 2019-11-28 Service transfer-out report processing method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911194048.XA CN111179098B (en) 2019-11-28 2019-11-28 Service transfer-out report processing method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN111179098A CN111179098A (en) 2020-05-19
CN111179098B true CN111179098B (en) 2023-07-14

Family

ID=70653769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911194048.XA Active CN111179098B (en) 2019-11-28 2019-11-28 Service transfer-out report processing method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN111179098B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003108781A (en) * 2001-09-27 2003-04-11 Nec Corp System, method and program for creating migration record
JP2004038432A (en) * 2002-07-02 2004-02-05 Shoji Tanaka Contributory pension system
US10311520B1 (en) * 2013-09-03 2019-06-04 Integrated Plan Design Llc. System and methods related to term life insurance

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339587A (en) * 2008-08-11 2009-01-07 中国网络通信集团公司 Method and system for bidirectionally transfering consultation
CN101477671A (en) * 2009-01-19 2009-07-08 招商银行股份有限公司 System and method for pension account management
CN102509238A (en) * 2011-11-29 2012-06-20 成都安朗电气自控设备有限公司 Bank non-cash business processing method, apparatus and system
CN106469412B (en) * 2015-08-17 2020-08-11 阿里巴巴集团控股有限公司 Data processing method and device
CN108510398A (en) * 2017-07-25 2018-09-07 平安科技(深圳)有限公司 Annuity method for processing business, system, server and storage medium
CN108446976B (en) * 2018-02-07 2019-05-24 平安科技(深圳)有限公司 A kind of common reserve fund transfer method, computer readable storage medium and terminal device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003108781A (en) * 2001-09-27 2003-04-11 Nec Corp System, method and program for creating migration record
JP2004038432A (en) * 2002-07-02 2004-02-05 Shoji Tanaka Contributory pension system
US10311520B1 (en) * 2013-09-03 2019-06-04 Integrated Plan Design Llc. System and methods related to term life insurance

Also Published As

Publication number Publication date
CN111179098A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
US20130297442A1 (en) System and method for routing and tracking real estate leads
US20020032647A1 (en) A Referrer-Controlled System for Transfering an Inbound Communication to One of a Plurality of Financial Assistance Providers
CN101777148A (en) Management method, management system for bill receiving commercial customers and management server equipment for commercial customers
US20100082391A1 (en) Method, device, and system for appointment messaging
JP7357042B2 (en) Method and apparatus for tracking, capturing, and synchronizing activity data across multiple devices
US11930051B2 (en) Network service system, computer storage medium for communication, and network service method
CN111340340B (en) Event processing method and device
CN111062689B (en) Method and device for processing cross-border service of RMB
US10375003B1 (en) System and method for establishing pricing for telecom services
CN108268996A (en) Task tracking processing method, system, computer equipment and storage medium
CN110298761A (en) Information updating method, device, computer equipment and storage medium
CN104881482A (en) Intellectual property case progress query method, device and system
CN109754337A (en) A kind of household services optimization method based on block chain technology
CN111311200B (en) Management method and device for guest consultation work order platform
CN101742002A (en) Business information management method, device and system
US8751590B2 (en) Method and system for managing a virtual actionable conversation
CN111179098B (en) Service transfer-out report processing method, system, equipment and medium
CN102970159B (en) Data auditing and repair process method and apparatus
CN113888330A (en) Data routing platform management system for financial enterprise
CN108764832A (en) Municipal administration and public sentiment demand approaches to IM, system, device and equipment
CN113051094A (en) Supervision data submission testing method and device
CN113256420B (en) Enterprise user identification method, device, equipment and medium in transaction
CN1722757B (en) Recording system based on voice communication
CN108809669A (en) Group customer underpayment management method and system, group customer framework
JP5691427B2 (en) Communication cost settlement system, apparatus, method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant